|
Use this template to build and manage your agency’s security policy lifecycle.
|
|
|
Use this template as a means to request and approve proposed exceptions to your security policies.
|
|
|
Use this tool to help you track ongoing exceptions to your security policies.
|
|
|
Use this workflow to help you formalize and document your policy exception approval process.
|
|
|
This tool will help you determine governance and management accountabilities and responsibilities and use them to build a visual governance and management model.
|
|
|
Use this storyboard to develop an information security governance and management model and implement essential governance processes.
|
|
|
The key deliverable in the Data Privacy Program blueprint, the Data Privacy Framework takes into account the current state of privacy and provides you with the steps to...
|
|
|
Use this communication deck template to present the results of the integrated security plan to stakeholders. This information security communication deck will help ensure...
|
|
|
Use this tool to identify and understand the owners of various security integration steps across the organization. This RACI chart will help clearly define each area's...
|
|
|
Use this tool to map organizational goals to IT goals, facilities goals, OT goals (if applicable), and integrated security goals. This tool serves as a repository for...
|
|